MCP Catalogs
Home

filesystem vs ExternalAttacker-MCP

Side-by-side comparison to help you pick between these two MCP servers.

filesystem
by modelcontextprotocol
ExternalAttacker-MCP
by MorDavid
Stars★ 85,748★ 76
30d uses
Score7739
Official
Categories
File SystemDeveloper ToolsProductivity
SecurityDeveloper Tools
LanguageTypeScriptPython
Last committhis month14 mo ago

filesystem · Summary

A feature-rich MCP server for filesystem operations with dynamic directory access control.

ExternalAttacker-MCP · Summary

ExternalAttacker-MCP provides automated attack surface mapping tools integrated through Model Context Protocol for security reconnaissance.

filesystem · Use cases

  • Enable AI models to read and write project files during development
  • Allow Claude or other MCP clients to browse and analyze codebases
  • Provide secure sandboxed access to specific directories for content generation

ExternalAttacker-MCP · Use cases

  • Automated external attack surface mapping for security teams
  • Bug bounty reconnaissance using natural language queries
  • Vulnerability assessment through AI-powered scanning workflows

filesystem · Install

Installation

Using NPX

{
  "mcpServers": {
    "filesystem": {
      "command": "npx",
      "args": [
        "-y",
        "@modelcontextprotocol/server-filesystem",
        "/path/to/allowed/directory"
      ]
    }
  }
}

Using Docker

{
  "mcpServers": {
    "filesystem": {
      "command": "docker",
      "args": [
        "run",
        "-i",
        "--rm",
        "--mount", "type=bind,src=/path/to/allowed/dir,dst=/projects/allowed/dir",
        "mcp/filesystem",
        "/projects"
      ]
    }
  }
}

VS Code Extension

Click the installation buttons in the README to install directly in VS Code.

ExternalAttacker-MCP · Install

  1. Clone the repository: git clone https://github.com/mordavid/ExternalAttacker-MCP.git && cd ExternalAttacker
  2. Install Python dependencies: pip install -r requirements.txt
  3. Install required Go tools (subfinder, naabu, httpx, cdncheck, tlsx, ffuf, gobuster, dnsx)
  4. Run the application: python ExternalAttacker-App.py (access at http://localhost:6991)
  5. Configure your MCP client with:
"mcpServers": {
    "ExternalAttacker-MCP": {
        "command": "python",
        "args": [
            "<Your_Path>\\ExternalAttacker-MCP.py"
        ]
    }
}```
Comparison generated from public README + GitHub signals. Last updated automatically.